S 4.362 Secure configuration of Bluetooth

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator, User

It is generally recommended to check the configuration preset by the dealer and change it if possible, because such configuration is often insecure:

Furthermore, it is recommended to regularly check the Bluetooth devices for hidden services and/or open ports by applying the corresponding tools.

Security patches and/or firmware updates provided by the device manufacturers should be installed after testing and if needed in accordance with the security requirements.

In order to enable secure operation of Bluetooth components, all devices connected to the network must be configured securely. Suitable security recommendations for clients are described in the corresponding modules of layer 3.

Review questions: